FileTypeVerifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
32a2a66811e11b7db85a902d2ccec4e164e374cc5bbeb1dfaf61777c12d1273d_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
32a2a66811e11b7db85a902d2ccec4e164e374cc5bbeb1dfaf61777c12d1273d_NeikiAnalytics
-
Size
1.9MB
-
MD5
ca6d2be3541d2b90971e90fe60e6d6c0
-
SHA1
3d49965bd6c8be723b4d37025036c66b5ca3628d
-
SHA256
32a2a66811e11b7db85a902d2ccec4e164e374cc5bbeb1dfaf61777c12d1273d
-
SHA512
0c1f39ee92f3b6fbb277ae79aa9cf6bc34b511da48bd9e2802b08683b0cb69e6349df04a36f7d9e4875940b3b577c26980764d63a334c9d3d19915ab9eeb53dc
-
SSDEEP
12288:HTyBO8v0AmWODk2vtPNJZ7D9p5zuldXnXf3auHbGqndVFbk:x8vUdDVv7DxAZquHPH9k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32a2a66811e11b7db85a902d2ccec4e164e374cc5bbeb1dfaf61777c12d1273d_NeikiAnalytics
Files
-
32a2a66811e11b7db85a902d2ccec4e164e374cc5bbeb1dfaf61777c12d1273d_NeikiAnalytics.exe windows:10 windows x86 arch:x86
a0dbf2f4f4ab884440e2abf3d7763781
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegGetValueW
RegOpenKeyExW
RegCloseKey
RegEnumKeyExW
RegQueryValueExW
RegEnumValueW
StartTraceW
StopTraceW
EnableTrace
OpenTraceW
ProcessTrace
CloseTrace
RegQueryValueW
RegEnumKeyW
kernel32
OpenSemaphoreW
LocalFree
CreateFileW
GetTickCount
CreateThread
CreateEventW
LockFile
WaitForSingleObject
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetTempPathW
MulDiv
CreateMutexExW
CreateSemaphoreExW
GetDateFormatW
WaitForSingleObjectEx
ReleaseMutex
ReleaseSemaphore
UnlockFile
GetThreadLocale
GetTimeFormatW
FormatMessageW
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
SetEvent
GetStartupInfoW
Sleep
GetCurrentThreadId
HeapAlloc
GetProcessHeap
HeapFree
GetModuleHandleExW
SetLastError
OutputDebugStringW
IsDebuggerPresent
GetLastError
GetProcAddress
GetModuleHandleW
GetModuleFileNameA
DebugBreak
UnhandledExceptionFilter
CloseHandle
gdi32
GetObjectW
DeleteObject
GetDeviceCaps
user32
SetParent
LoadBitmapW
SendMessageW
ReleaseDC
GetDC
DestroyWindow
DestroyMenu
GetWindowLongW
SetWindowLongW
CharNextW
LoadStringW
PostMessageW
GetAncestor
GetDesktopWindow
GetClientRect
CreatePopupMenu
GetMenuDefaultItem
GetMenuItemCount
GetDlgItem
SetWindowPos
CreateWindowExW
ShowWindow
GetDlgCtrlID
MoveWindow
mfc42u
ord1258
ord1262
ord823
ord825
msvcrt
free
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_vsnwprintf
wprintf
__CxxFrameHandler3
??0exception@@QAE@XZ
memcpy_s
_vsnprintf_s
memmove_s
_wfreopen
fflush
fclose
wcschr
calloc
_XcptFilter
__p__commode
_amsg_exit
__wgetmainargs
__set_app_type
exit
_exit
_cexit
__p__fmode
__setusermatherr
_initterm
_wcmdln
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_lock
_unlock
__dllonexit
_onexit
__iob_func
_controlfp
_except_handler4_common
memset
_CxxThrowException
ole32
CoGetMalloc
OleUninitialize
CoCreateGuid
CoGetInterfaceAndReleaseStream
RevokeDragDrop
RegisterDragDrop
CLSIDFromString
CoMarshalInterThreadInterfaceInStream
StringFromGUID2
PropVariantClear
CoCreateInstance
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
StringFromCLSID
shlwapi
SHGetValueW
UrlEscapeW
SHStrDupW
ord219
ord176
ord158
StrStrIW
PathRemoveArgsW
PathRemoveBlanksW
PathUnquoteSpacesW
PathStripPathW
PathRemoveFileSpecW
PathRemoveBackslashW
PathFindFileNameW
AssocQueryStringW
ord615
uxtheme
SetWindowTheme
comctl32
ord388
ord324
ImageList_Create
ImageList_SetBkColor
ImageList_AddMasked
ord323
ord321
PropertySheetW
CreatePropertySheetPageW
ord320
DestroyPropertySheetPage
ord344
propsys
InitPropVariantFromFileTimeVector
InitPropVariantFromUInt32Vector
InitPropVariantFromInt32Vector
InitPropVariantFromFileTime
PSFormatForDisplay
InitPropVariantFromInt16Vector
InitPropVariantFromBuffer
InitPropVariantFromBooleanVector
InitPropVariantFromStringAsVector
PSGetPropertyDescription
PSGetNameFromPropertyKey
PSLookupPropertyHandlerCLSID
PropVariantCompareEx
InitPropVariantFromUInt16Vector
shell32
ord777
SHCreateItemFromParsingName
SHCreateShellItemArrayFromDataObject
SHCreateItemInKnownFolder
SHCreateItemFromRelativeName
CommandLineToArgvW
ord704
ord100
ShellExecuteExW
mscoree
LockClrVersion
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 341KB - Virtual size: 340KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE